Deployment Guide

You can congure multiple virtual terminals at one time by entering a number and an end-number.
2 Congure a level and set the maximum number of messages to print.
LINE mode
logging synchronous [level severity-level | all] [limit]
Congure the following optional parameters:
level severity-level: the range is from 0 to 7. The default is 2. Use the all keyword to include all messages.
limit: the range is from 20 to 300. The default is 20.
To view the logging synchronous conguration, use the show config command in LINE mode.
Enabling Timestamp on Syslog Messages
By default, syslog messages do not include a time/date stamp stating when the error or message was created.
To enable timestamp, use the following command.
Add timestamp to syslog messages.
CONFIGURATION mode
service timestamps [log | debug] [datetime [localtime] [msec] [show-timezone] | uptime]
Specify the following optional parameters:
datetime: You can add the keyword localtime to include the localtime, msec, and show-timezone. If you do not add
the keyword
localtime, the time is UTC.
uptime: To view time since last boot.
If you do not specify a parameter, the system congures uptime.
To view the conguration, use the show running-config logging command in EXEC privilege mode.
To disable time stamping on syslog messages, use the no service timestamps [log | debug] command.
Enabling Secure Management Mode
The Switch supports the secure management mode on Dell Networking OS. It is a congurable mode where the access of Chassis
Management Controller (CMC) is bypassed. With this change, CMC is not allowed to congure or view Networking information, upgrade
software, or view the conguration.
Use the conguration command, enable secure to put the switch into secure mode. For the changes to take eect, save the
conguration and then reboot the system. The switch automatically enters the secure mode following reboot. Check the status of the
switch in the
.xml file that it generates during bootup. The CMC reads the switch.xml le and sets the secure mode. It also
disables the CMC Command Line Interface (CLI) or Graphical User Interface (GUI) from being able to do the following on the switch:
Connect to the Switch.
Firmware updates for the Switch.
Setting or viewing network interface conguration like Internet Protocol (IP) address, network mask, gateway, and Dynamic Host
Conguration Protocol (DHCP).
Secure mode limits the ability to view or modify conguration, or upgrade software to the switches external USB console port and internal
management network only. CMC continues to have access to other properties like power status and system health.
Management
77